0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Overconfidence Leaves Firms Exposed to Security Risk
By: Guest Writer
October 15, 2018

In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision makers, and published the results as a Forrester Opportunity Snapshot titled “Don’t Just Integrate, Automate”. Survey respondents were asked, “On average, how long does it take to identify and remediate an information security incident (including ...

The Most Important Coverage on your Cyber Liability Insurance Policy
By: travissholt
October 11, 2018

Content originally published on my Medium blog. Cyber Liability insurance is often referred to as the Wild Wild West of insurance, mainly because the forms and coverages differ so greatly from one to the next. It’s incredibly difficult for owners and c-level executives to differentiate one policy from the next and frequently their broker isn’t much help. ...

Expansion on Data Privacy and Protection Laws (CCSK Prep)
By: abrockwa
October 11, 2018

Authored in partnership with Raj Dhaliwal, Juris Doctor. Introduction While studying for the Certificate of Cloud Security Knowledge (CCSK), offered by the Cloud Security Alliance (CSA), one of the main domains of focus is “Legal Issues: Contracts and Electronic Discovery,” which includes international law and breach disclosure laws. The CCSKv4 exam itself does not ...

The Top 5 Industries Prone to Computer Infections
By: Zubair Ansari
October 11, 2018

Top 5 Industries where computers are used, and how they can be infected. Airports (Flight) Computers are commonly used in an airport for various purpose as like as to approve visas and tickets, an arrangement of an airplane, passengers, passenger’s security and others, etc. Disadvantage : A ...

The Key to a Truly Secure Password
By: tylermaciel
October 11, 2018

Passwords are important - Duh. They are one of the most important aspects of keeping your information secure. Whether personalized or randomized, they are something unique to you, and should not be easily guessed. The key to a great password is being random. You want something random and made up of all sorts of numbers, letters and symbols. Generally, ...

Best Practices to Identify Malicious Applications in Android
By: Dr. Michael J. Garbade
October 10, 2018

Android is a significant platform for mobile operators, which boasts of more than a billion users globally and a market share of about 80%. However, the platform is a target for malware schemers who are constantly infringing on the security of Android devices. Sunil Kumar , who is an India-based cybersecurity professional and currently ...

Typo Squatting Domains
By: peternovack
October 10, 2018

On September 9 th of 2017 Equifax the Credit Ratings major of U.S.A was in news. Now to those who are aware of the process it might not be something of a shock, after all, it just announced a major breach that affected almost half of America's population and the way they handled the issue was also ...

Top 4 Benefits of VMware Training Courses
By: Vikrant Saran
October 9, 2018

Back in the days, if you want to invest heavily in your business establishment, you needed hardware units and servers to meet business requirements on a growing scale. In recent times; however, VMware virtualization has changed the scenario.With the new technological advancements and advent of cloud computing and virtualization, enterprises can now run many servers and desktops on a ...

How to Recover Data from Corrupted Pen Drive in Windows 10
By: lauramathews
October 9, 2018

Pen drive stores all types of data like images, videos, audio’s, files and folders etc. But pen drive data is always prone to lose due to virus attack, improper ejection, human error and suddenly system shut down etc. You don’t know how to recover data from corrupted pen drive in Windows 10. If you are facing these issues then ...

Hacking: What's Real?
By: PATHANGE BALAJI RAO
October 9, 2018

In honor of October being Cybersecurity Awareness Month (NCSAM), I want to make it clear: No system is secure. It's our duty to make them secure and reliable. We, the Cybersecurity Experts! BY-PATHANGE BALAJI RAO We are very much concerned about our money and out data resulting from the time and privacy.We always ...